Transaction authorisation system & method

Inactive Publication Date: 2009-12-17
QPAY HLDG
View PDF11 Cites 74 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010]Broadly, the invention allows transactions, such as credit card payments, online banking funds transfers, or others, to be securely authorised by a customer, preferably before the transaction is concluded by the relevant institution. In one form, such authorisation occurs when the customer, prompted by an interactive voice response (IVR) system for example, provides one or more unique identifiers to validate his or her identity and authenticate the transaction. Alternatively, the customer may indicate that the transaction is fraudulent which is in turn communicated to the relevant institution so that appropriate actions may be taken. The information maintained by the authorisation system is separated from the account and customer records of the financial institution in order to maximise security in the authorisation process and mitigate the risk of fraudulent authentication of transactions that may arise as a result of unauthorised access to the stored information.
[0041]Use of a secure identifier such as a PIN which is memorised by the customer or biometric data (e.g. voice print, finger print, retina scan, behaviometric etc.) means that the transaction is only authorised once the identity of the customer, using information which is not normally available to a fraudulent person, is verified. A further advantage is provided by the fact that the customer's verification and contact details in the system are maintained in a separate data store to the customers bank details with only a single security identifier (known only to the bank's system and the authorisation system) linking the separated data stores. Such a setup provides increased security as unauthorised access to any one of the data stores on its own will not provide information adequate to circumvent the authorisation system and conduct fraudulent transactions.

Problems solved by technology

Once such details are fraudulently acquired they are utilised to make financial payments or to misappropriate funds from financial accounts.
The account holder is often without any knowledge of these fraudulent transactions until after they have been concluded and it is too late to intervene.
In current systems used to authorise financial transactions, it is difficult and often impossible to obtain a firm guarantee that the person initiating the transaction is the account holder and is authorised to conclude the transaction.
However, this process does not provide any form of verification that the individual making the transaction is indeed authorised to do so.
Although, a merchant may compare a signature an the credit card to the signature of the customer, such methods of verifying whether or not the transaction is fraudulent are far from foolproof.
Furthermore, the account holder and credit card provider are relying on the merchant to deny transactions that appear to be fraudulent and unauthorised.
This issue is particularly pronounced with transactions conducted in the online environment or over the telephone, where the merchant is unable to verify the customer's signature and therefore determine whether or not the transaction is fraudulent.
While the CVV code helps ascertain that the customer placing the order actually possesses the credit / debit card and that the card account is legitimate, this authentication procedure is ineffective when the card itself has been misappropriated or in scenarios where there has been unauthorised access to the financial records of the account holder.
Similarly, in current systems where the customer is required to provide a password or pin number before a transaction is authorised, unauthorised access to the account holder's records is likely to provide the information required to fraudulently authorise transactions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction authorisation system & method
  • Transaction authorisation system & method
  • Transaction authorisation system & method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079]The present invention is not specific to any particular hardware or software implementation, and is at a conceptual level above specifics of implementation. It is to be understood that various other embodiments and variations of the invention may be produced without departing from the spirit or scope of the invention. The following is provided to assist in understanding the practical implementation of particular embodiments of the invention.

[0080]The authorisation system 20, as shown in FIG. 1, includes a data processing means, i.e. server 22, with communication means 26 which communicates with an institution system 10 of an institution 50 and a customer device 30 of a customer 40. The customer 40 is generally a customer of the institution 50, but may be an employee, supplier, citizen relating to a government agency or similar. In various circumstances, therefore, the customer 40 may be identified by the institution system 10 using any form of public identification data (Publi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A transaction authorisation system for allowing a customer to authorise transactions relating to an institution account, the system including a data storage for enabling access to identification data associated with the customer and a remote communication device (RCD) of the customer, and security identifier data associating the customer account with the identification data. The system also includes a communication device for receiving an authorisation request, which is referenced to the security identifier data, in relation to the transaction from the institution and for enabling communication with the customer via the RCD to authorise a transaction on the customer account. A system data processor identifies the customer and RCD using the identification data and determines if the transaction is authorised by the customer. The communication device provides an indication, which is referenced to the security identifier data, to the institution of whether or not the transaction is authorised by the customer.

Description

FIELD OF THE INVENTION[0001]The present invention relates to a system and method for the authorisation of transactions such as credit card purchases, bank transfers, and share purchases, particularly in environments where remote payments for goods and services are made.BACKGROUND OF THE INVENTION[0002]Security of financial and other types of transactions is of great importance due to the relatively recent growth of threats such as phishing and pharming which are intended to fraudulently acquire sensitive information, such as passwords, pin numbers and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Once such details are fraudulently acquired they are utilised to make financial payments or to misappropriate funds from financial accounts. The account holder is often without any knowledge of these fraudulent transactions until after they have been concluded and it is too late to intervene. It is desirable, therefore, to seek auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/00G06Q40/00G10L17/00H04M1/64G06K5/00
CPCG06F21/35G06F21/629G06F2221/2103G06F2221/2115G06F2221/2129H04L63/08G06Q20/40G06Q20/4014G06Q20/40145G06Q20/425G06Q20/32
Inventor WALTER, GREG
Owner QPAY HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products